The SCEAS System
Navigation Menu

Search the dblp DataBase


Noria Foukia: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Noria Foukia
    IDReAM: Intrusion Detection and Response Executed with Agent Mobility. [Citation Graph (0, 0)][DBLP]
    Engineering Self-Organising Systems, 2004, pp:227-239 [Conf]
  2. Noria Foukia
    IDReAM: intrusion detection and response executed with agent mobility architecture and implementation. [Citation Graph (0, 0)][DBLP]
    AAMAS, 2005, pp:264-270 [Conf]
  3. Noria Foukia, Salima Hassas
    Managing Computer Networks Security through Self-Organization: A Complex System Perspective. [Citation Graph (0, 0)][DBLP]
    Engineering Self-Organising Systems, 2003, pp:124-138 [Conf]
  4. Giovanna Di Marzo Serugendo, Noria Foukia, Salima Hassas, Anthony Karageorgos, Soraya Kouadri Mostéfaoui, Omer F. Rana, Mihaela Ulieru, Paul Valckenaers, Chris van Aart
    Self-Organisation: Paradigms and Applications. [Citation Graph (0, 0)][DBLP]
    Engineering Self-Organising Systems, 2003, pp:1-19 [Conf]
  5. Noria Foukia, Li Zhou, Clifford Neuman
    Multilateral Decisions for Collaborative Defense Against Unsolicited Bulk E-mail. [Citation Graph (0, 0)][DBLP]
    iTrust, 2006, pp:77-92 [Conf]
  6. Noria Foukia, Salima Hassas, Serge Fenet, Paul Albuquerque
    Combining Immune Systems and Social Insect Metaphors: A Paradigm for Distributed Intrusion Detection and Response System. [Citation Graph (0, 0)][DBLP]
    MATA, 2003, pp:251-264 [Conf]
  7. Tatyana Ryutov, Li Zhou, Clifford Neuman, Noria Foukia, Travis Leithead, Kent E. Seamons
    Adaptive trust negotiation and access control for grids. [Citation Graph (0, 0)][DBLP]
    GRID, 2005, pp:55-62 [Conf]

  8. DDoS Defense Mechanisms: A New Taxonomy. [Citation Graph (, )][DBLP]

  9. Social Collaboration, Stochastic Strategies and Information Referrals. [Citation Graph (, )][DBLP]

  10. An Efficient Reputation-Based Routing Mechanism for Wireless Sensor Networks: Testing the Impact of Mobility and Hostile Nodes. [Citation Graph (, )][DBLP]

  11. Using trust for key distribution and route selection in Wireless Sensor Networks. [Citation Graph (, )][DBLP]

Search in 0.001secs, Finished in 0.002secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002